Advertisement
Guest User

Untitled

a guest
Jun 23rd, 2015
470
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.72 KB | None | 0 0
  1. ipsec__plutorun: Starting Pluto subsystem...
  2. pluto[2724]: Starting Pluto (Openswan Version 2.6.37; Vendor ID OEu\134d\134jy\134\134ap) pid:2724
  3. pluto[2724]: LEAK_DETECTIVE support [disabled]
  4. pluto[2724]: OCF support for IKE [disabled]
  5. pluto[2724]: SAref support [disabled]: Protocol not available
  6. pluto[2724]: SAbind support [disabled]: Protocol not available
  7. pluto[2724]: NSS support [disabled]
  8. pluto[2724]: HAVE_STATSD notification support not compiled in
  9. pluto[2724]: Setting NAT-Traversal port-4500 floating to on
  10. pluto[2724]: port floating activation criteria nat_t=1/port_float=1
  11. pluto[2724]: NAT-Traversal support [enabled]
  12. pluto[2724]: using /dev/urandom as source of random entropy
  13. pluto[2724]: ike_alg_register_enc(): Activating OAKLEY_AES_CBC: Ok (ret=0)
  14. pluto[2724]: starting up 1 cryptographic helpers
  15. pluto[2724]: started helper pid=2731 (fd:6)
  16. pluto[2731]: using /dev/urandom as source of random entropy
  17. pluto[2724]: Using Linux 2.6 IPsec interface code on 3.18.14+ (experimental code)
  18. pluto[2724]: ike_alg_register_enc(): Activating aes_ccm_8: Ok (ret=0)
  19. pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
  20. pluto[2724]: ike_alg_register_enc(): Activating aes_ccm_12: FAILED (ret=-17)
  21. pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
  22. pluto[2724]: ike_alg_register_enc(): Activating aes_ccm_16: FAILED (ret=-17)
  23. pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
  24. pluto[2724]: ike_alg_register_enc(): Activating aes_gcm_8: FAILED (ret=-17)
  25. pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
  26. pluto[2724]: ike_alg_register_enc(): Activating aes_gcm_12: FAILED (ret=-17)
  27. pluto[2724]: ike_alg_add(): ERROR: Algorithm already exists
  28. pluto[2724]: ike_alg_register_enc(): Activating aes_gcm_16: FAILED (ret=-17)
  29. pluto[2724]: Changed path to directory '/etc/ipsec.d/cacerts'
  30. pluto[2724]: Changed path to directory '/etc/ipsec.d/aacerts'
  31. pluto[2724]: Changed path to directory '/etc/ipsec.d/ocspcerts'
  32. pluto[2724]: Changing to directory '/etc/ipsec.d/crls'
  33. pluto[2724]: Warning: empty directory
  34. pluto[2724]: added connection description "L2TP-PSK-NAT"
  35. pluto[2724]: added connection description "L2TP-PSK-noNAT"
  36. pluto[2724]: listening for IKE messages
  37. pluto[2724]: adding interface eth0/eth0 172.16.0.2:500
  38. pluto[2724]: adding interface eth0/eth0 172.16.0.2:4500
  39. pluto[2724]: adding interface lo/lo 127.0.0.1:500
  40. pluto[2724]: adding interface lo/lo 127.0.0.1:4500
  41. pluto[2724]: adding interface eth0/eth0 2601:648:8503:91aa:ba27:ebff:fe81:2735:500
  42. pluto[2724]: adding interface lo/lo ::1:500
  43. pluto[2724]: loading secrets from "/etc/ipsec.secrets"
  44. pluto[2724]: loading secrets from "/var/lib/openswan/ipsec.secrets.inc"
  45. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
  46. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
  47. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
  48. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
  49. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
  50. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
  51. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
  52. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
  53. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
  54. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
  55. pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  56. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
  57. pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
  58. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
  59. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
  60. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
  61. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
  62. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
  63. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
  64. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
  65. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
  66. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
  67. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
  68. pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  69. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
  70. pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
  71. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
  72. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
  73. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
  74. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
  75. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
  76. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
  77. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
  78. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
  79. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
  80. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
  81. pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  82. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
  83. pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
  84. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [RFC 3947] method set to=109
  85. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike] method set to=110
  86. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [8f8d83826d246b6fc7a8a6a428c11de8]
  87. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [439b59f8ba676c4c7737ae22eab8f582]
  88. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [4d1e0e136deafa34c4f3ea9f02ec7285]
  89. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [80d0bb3def54565ee84645d4c85ce3ee]
  90. pluto[2724]: packet from 73.134.56.18:500: ignoring unknown Vendor ID payload [9909b64eed937c6573de52ace952fa6b]
  91. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03] meth=108, but already using method 110
  92. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02] meth=107, but already using method 110
  93. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [draft-ietf-ipsec-nat-t-ike-02_n] meth=106, but already using method 110
  94. pluto[2724]: packet from 73.134.56.18:500: ignoring Vendor ID payload [FRAGMENTATION 80000000]
  95. pluto[2724]: packet from 73.134.56.18:500: received Vendor ID payload [Dead Peer Detection]
  96. pluto[2724]: packet from 73.134.56.18:500: initial Main Mode message received on 172.16.0.2:500 but no connection has been authorized with policy=PSK
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement